Lucene search

K
cve[email protected]CVE-2023-26493
HistoryMar 27, 2023 - 10:15 p.m.

CVE-2023-26493

2023-03-2722:15:21
CWE-77
CWE-74
web.nvd.nist.gov
74
cocos engine
web-interface-check.yml
command injection
cve-2023-26493
github runner
github
security vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.4%

Cocos Engine is an open-source framework for building 2D & 3D real-time rendering and interactive content. In the github repo for Cocos Engine the web-interface-check.yml was subject to command injection. The web-interface-check.yml was triggered when a pull request was opened or updated and contained the user controllable field (${{ github.head_ref }} – the name of the fork’s branch). This would allow an attacker to take over the GitHub Runner and run custom commands (potentially stealing secrets such as GITHUB_TOKEN) and altering the repository. The workflow has since been removed for the repository. There are no actions required of users.

Affected configurations

Vulners
NVD
Node
cocoscocos-engineRange<6d06aefa26
VendorProductVersionCPE
cocoscocos\-engine*cpe:2.3:a:cocos:cocos\-engine:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "cocos",
    "product": "cocos-engine",
    "versions": [
      {
        "version": "< 6d06aefa26",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

49.4%

Related for CVE-2023-26493